Sécurité - Ethical Hacking and Countermeasures

Document Sample
Sécurité - Ethical Hacking and Countermeasures Powered By Docstoc
					    Sécurité
       Formation en Intra ou Inter-entreprises

                                                                          5
                                   Ethical Hacking and                  jours
                                    Countermeasures                  [ 35 heures ]

                                                                        CEHV6



                                           plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




OBJECTIF
    This class will immerse the student into an interactive environment where they will be
    shown how to scan, test, hack and secure their own systems. The lab intensive
    environment gives each student in-depth knowledge and practical experience with the
    current essential security systems. Students will begin by understanding how perimeter
    defenses work and then be lead into scanning and attacking their own networks, no real
    network is harmed. Students then learn how intruders escalate privileges and what steps
    can be taken to secure a system. Students will also learn about Intrusion Detection,
    Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
    When a student leaves this intensive 5 day class they will have hands on understanding
    and experience in Ethical Hacking. This course prepares you for EC-Council Certified
    Ethical Hacker exam 312-50.


PUBLIC
    This course will significantly benefit security officers, auditors, security professionals, site
    administrators, and anyone who is concerned about the integrity of the network
    infrastructure



PROGRAMME
1     Introduction to Ethical Hacking



2 Hacking Laws


3 Footprinting


4 Google Hacking


5 Scanning


6 Enumeration


7 System Hacking


FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
     Sécurité
        Formation en Intra ou Inter-entreprises

                                                                    5
                               Ethical Hacking and                jours
                                Countermeasures                [ 35 heures ]

                                                                  CEHV6



                                     plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx



 8 Trojans and Backdoors


 9 Viruses and Worms


10    Sniffers



11    Social Engineering



12    Phishing



13    Hacking Email Accounts



14    Denial-of-Service



15    Session Hijacking



16    Hacking Web Servers



17    Web Application Vulnerabilities



18    Web-Based Password Cracking Techniques



19    SQL Injection



20 Hacking Wireless Networks


21    Physical Security


FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
     Sécurité
        Formation en Intra ou Inter-entreprises

                                                                   5
                             Ethical Hacking and                 jours
                              Countermeasures                 [ 35 heures ]

                                                                 CEHV6



                                    plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx



22 Linux Hacking


23 Evading IDS, Firewalls and Detecting Honey Pots


24 Buffer Overflows


25 Cryptography


26 Penetration Testing


27 Covert Hacking


28 Writing Virus Codes


29 Assembly Language Tutorial


30 Exploit Writing


31    Smashing the Stack for Fun and Profit



32 Windows Based Buffer Overflow Exploit Writing


33 Reverse Engineering


34 MAC OS X Hacking


35 Hacking Routers, cable Modems and Firewalls

FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
     Sécurité
        Formation en Intra ou Inter-entreprises

                                                                  5
                             Ethical Hacking and                jours
                              Countermeasures                [ 35 heures ]

                                                                CEHV6



                                   plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx



36 Hacking Mobile Phones, PDA and Handheld Devices


37 Bluetooth Hacking


38 VoIP Hacking


39 RFID Hacking


40 Spamming


41    Hacking USB Devices



42 Hacking Database Servers


43 Cyber Warfare- Hacking, Al-Qaida and Terrorism


44 Internet Content Filtering Techniques


45 Privacy on the Internet


46 Securing Laptop Computers


47 Spying Technologies


48 Corporate Espionage- Hacking Using Insiders


49 Creating Security Policies

FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
     Sécurité
        Formation en Intra ou Inter-entreprises

                                                                   5
                            Ethical Hacking and                  jours
                             Countermeasures                  [ 35 heures ]

                                                                 CEHV6



                                    plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx



50 Software Piracy and Warez


51    Hacking and Cheating Online Games



52 Hacking RSS and Atom


53 Hacking Web Browsers (Firefox, IE)


54 Proxy Server Technologies


55 Data Loss Prevention


56 Hacking Global Positioning System (GPS)


57 Computer Forensics and Incident Handling


58 Credit Card Frauds


59 How to Steal Passwords


60 Firewall Technologies


61    Threats and Countermeasures



62 Case Studies


63 Botnets

FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
 Sécurité
    Formation en Intra ou Inter-entreprises

                                                            5
                       Ethical Hacking and                jours
                        Countermeasures                [ 35 heures ]

                                                          CEHV6



                             plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx




FORMATION CATALOGUE INFORMATIQUE -
  Sécurité
     Formation en Intra ou Inter-entreprises

                                                                5
                           Ethical Hacking and                jours
                            Countermeasures                [ 35 heures ]

                                                              CEHV6



                                 plan de cours disponible à l'adresse http://www.adhara.fr/cehv6.aspx



64 Economic Espionage


65 Patch Management


66 Security Convergence


67 Identifying the Terrorist




FORMATION CATALOGUE INFORMATIQUE -